, Common Vulnerability Scoring System. ? https://www.first.org/cvss

T. Cvenew-sur, ? https://twitter

?. Debian and . Security-information, ? https://www.debian.org/security

, LAMP (software bundle) ? https

, MEAN (software bundle) ? https

, National Vulnerability Database. ? https://nvd.nist.gov

, Spring framework. ? https://spring.io

, Talos -Author of the Official Snort Rule Sets. ? https

, The MITRE Corporation. ? https://www.mitre.org

, ). ? A Learning-Based Approach to Reactive Security. CoRR, p.1155, 2009.

, ? Security SLAs for Federated Cloud Services, 2011 Sixth International Conference on Availability, Reliability and Security, pp.202-209, 2011.

(. L. Bilge, Before we knew it, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.833-844, 2012.
DOI : 10.1145/2382196.2382284

, ? Aggregating CVSS Base Scores for Semantics- Rich Network Security Metrics, 2012 IEEE 31st Symposium on Reliable Distributed Systems, pp.31-40, 2012.

, ? Familiarity Breeds Contempt : The Honeymoon Effect and the Role of Legacy Code in Zero-day Vulnerabilities, Proceedings of the 26th Annual Computer Security Applications Conference, pp.251-260, 2010.

, ? SLA Perspective in Security Management for Cloud Computing, Sixth International Conference on Networking and Services, pp.212-217, 2010.

, ? The Myth of Software and Hardware Vulnerability Management. ? https: //www.foo.be, 2016.

, ? Large-scale Vulnerability Analysis, Proceedings of the 2006 SIGCOMM Workshop on Large-scale Attack Defense, pp.131-138, 2006.

, ? Towards a security SLA-based cloud monitoring service, pp.598-603, 2014.

, ? A Large Scale Exploratory Analysis of Software Vulnerability Life Cycles, Proceedings of the 34th International Conference on Software Engineering, pp.771-781

, SEC2 2016 -Second workshop on Security in Clouds, 2016.

, ? A novel approach to manage cloud security SLA incidents, Future Generation Computer Systems, vol.72, pp.193-205, 2017.

, ? After We Knew It : Empirical Study and Modeling of Costeffectiveness of Exploiting Prevalent Known Vulnerabilities Across IaaS Cloud, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, ASIA CCS '14, pp.317-328, 2014.